Abstract
Rust is a new system programming language that offers a practical and safe alternative to C. Rust is unique in that it enforces safety without runtime overhead, most importantly, without the overhead of garbage collection. While zero-cost safety is remarkable on its own, we argue that the superpowers of Rust go beyond safety. In particular, Rust's linear type system enables capabilities that cannot be implemented efficiently in traditional languages, both safe and unsafe, and that dramatically improve security and reliability of system software. We show three examples of such capabilities: zero-copy software fault isolation, efficient static information flow analysis, and automatic checkpointing. While these capabilities have been in the spotlight of systems research for a long time, their practical use is hindered by high cost and complexity. We argue that with the adoption of Rust these mechanisms will become commoditized.
Citation
Abhiram Balasubramanian,
Marek Baranowski,
Anton Burtsev,
Aurojit Panda,
Zvonimir Rakamaric,
Leonid Ryzhyk
System Programming in Rust: Beyond Safety
Proceedings of the 16th Workshop on Hot Topics in Operating Systems (HotOS), 156--161, doi:10.1145/3139645.3139660, 2017.
BibTeX
@inproceedings{2017_hotos_bbbprr, title = {System Programming in Rust: Beyond Safety}, author = {Abhiram Balasubramanian and Marek Baranowski and Anton Burtsev and Aurojit Panda and Zvonimir Rakamaric and Leonid Ryzhyk}, booktitle = {Proceedings of the 16th Workshop on Hot Topics in Operating Systems (HotOS)}, publisher = {ACM}, pages = {156--161}, doi = {10.1145/3139645.3139660}, year = {2017} }
Acknowledgements
We thank the anonymous HotOS reviewers. This material is partially based upon work supported by the National Science Foundation under Grants No. 1319076 and No. 1527526.